-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
when running in podman rootless the created /var/run/docker.sock links to non existent file in podman machine #18480
Comments
as discussed @n1hility |
this is a good issue @maxandersen ... thanks for bringing it up. It hightlights our struggle of being rootless OR rootful and docker being largely only rootful. Symlinking the rootful socket to a rootless socket in any way seems misleading at the least. |
yeah its not perfect. If we can find a way to make it known where the right user socket is no matter if running rootless or rootfull would be a start. Then I could at least provide a reliable way for user to configure testcontainers - optimally look into auto detection in testcontainers. But that would possibly require podman would support |
So I think it makes sense to adjust the /var/run/docker.sock symlink created by tmpfiles (BUT not /run/podman.sock, which I agree would be confusing); Here is why:
The end result would be consistency between the guest and host with docker clients, along with this use case that Max references where a privileged container expects to be able to mount /var/run/docker.sock. This week I can propose a small patch for discussion that would pre-set the existing ignition value for /var/run/docker.sock to be based on the rootful setting and then have some adjustment logic on start if the setting changes. |
SGTM |
Issue Description
when you run podman rootless the /var/run/docker.sock inside the container points to a podman.sock that is not accessible to read/write
Steps to reproduce the issue
Steps to reproduce the issue
start podman rootless
this gives the issue that when ryuk is started by testcontainers it ends up with an access to a docker socket that it cannot use.
which in turn makes testcontainers not able to "just work" even if they run with
--privileged
which would typically work on Linux podman runs but not on podman machine.Alternative is that those who run these containers know that specifically when using via podman you use the user writable socket:
Describe the results you received
Describe the results you received
Describe the results you expected
I expected that the /var/run/docker.sock would be accessible; at least when running with priviliged.
podman info output
If you are unable to run podman info for any reason, please provide the podman version, operating system and its version and the architecture you are running.
Podman in a container
Yes
Privileged Or Rootless
None
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Additional information
Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
The text was updated successfully, but these errors were encountered: